Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Web Discussions [Focused Discussion]: Cutting-edge or standards-based Web programming? Collapse

In the world of programming, there is often a dichotomy between Web programmers advocating cutting-edge techniques and those supporting well-established standards. To the former, new techniques may represent greater possibilities. Looking at the programming field as a whole, new programming techniques could mean better compression, new functions for interactive Web features, more display possibilities, etc.

That may seem well and good, but now consider the perspective of programmers preferring standards. Remember that no matter how advanced cutting-edge techniques seem, they are only as good as the browser that can interpret the code. You can have the best coding techniques in the world, but if the browser used by the end user does not support it (and therefore cannot read it), then your page will not be viewed as intended.

Of course, these examples only mark some of the points made on both sides of this cutting-edge vs. standards-based Web programming debate. For this Discussion, you are tasked with taking this argument further as you compare the merits of both sides of this dichotomy.
To complete this Discussion:

Post: Create an initial post in which you take a position on using cutting-edge Web programming techniques or standards-based Web programming techniques. Compare the merits and weaknesses of programmers using cutting-edge techniques with those using well-established standards with widespread browser support. Based on your comparison, explain which approach you think is better. Be sure to justify any choices, assumptions, or claims that you make using the suggested Learning Resources for this week and/or your own research.

The document should be should be 350-500 words with at least 10 references in Haward Style.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92010462
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Computer Engineering

How do i start off creating a computer program that manages

How do I start off creating a computer program that manages a to-do list? I am using Visual Studio C progamming. I have to create a menu-based system that manages tasks. here is the parameters.. That is, the Todo app man ...

Explain how amazon and walmart companies use information

Explain how Amazon and Walmart companies use Information and Communication Technologies (ICT) in their competitive strategies. Highlight the differences in their use of ICT.

Suppose users share a 3 mbps link also suppose each user

Suppose users share a 3 Mbps link. Also suppose each user requires 150 kbps when transmitting, but each user transmits only 10 percent of the time. When circuit switching is used, how many users can be supported? For the ...

What is a good analogy of subnetting whats a break down of

What is a good analogy of Subnetting? What's a break down of how it is used within a company?

Question sunshine health corporation is seeking to improve

Question : Sunshine Health Corporation is seeking to improve overall connectivity across their corporate campus near the Hawaii Kai Marina, Honolulu, Hawaii. The campus buildings have recently been updated, thus the LANs ...

Assignment - confidential organizational information and

Assignment - Confidential Organizational Information and Employee Responsibility As an employee, you are often required to sign confidentiality agreements when beginning work at a new company. You may also be required to ...

The literature on honeypots or so called fake networks to

The literature on honeypots or so called "fake networks" to attract hackers and attackers frequently mentions "entrapment" as one of the legal issues that must be considered. How of a concern is entrapment? What are some ...

Question 1 war driving is a wireless attack describe at

Question: 1. War driving is a wireless attack. Describe at least four war driving tools and the purpose of each. Your response should be at least 150 words in length. 2. Name and describe the four major access control mo ...

Question suppose that a disk drive has 5000 cylinders

Question : Suppose that a disk drive has 5,000 cylinders, numbered 0 to 4, 999. The drive is currently serving a request at cylinder 2, 150, and the previous request was at cylinder 1, 805. The queue of pending requests, ...

Question 1 assume that you are the project manager for an

Question: 1) Assume that you are the project manager for an upcoming new information systems project designed to replace your organization's old inventory management system. The server and database will also be upgraded. ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As